More to explore:

All Results

  • Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Network Security, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis

  • Skills you'll gain: Email Security, Cybersecurity, Hardening, Authorization (Computing), Cyber Attacks, Security Awareness, Security Controls, Threat Management, Encryption, Data Security, Identity and Access Management, Authentications, Application Security, Endpoint Security, Threat Detection, Cryptography, Malware Protection, Patch Management, Multi-Factor Authentication

  • Skills you'll gain: Interviewing Skills, Verbal Communication Skills, Cybersecurity, Communication Strategies, Communication, Professional Development, Penetration Testing, Personal Attributes, Stress Management, Branding, Adaptability, Collaboration, Negotiation, Digital Forensics

  • Skills you'll gain: Cybersecurity, Cyber Attacks, Data Security, Computer Security, Computer Security Awareness Training, Cyber Security Strategy, Security Awareness, Threat Management, Network Security, Information Privacy, Malware Protection, Email Security, Mitigation

  • University of California, Irvine

    Skills you'll gain: Threat Modeling, Threat Management, Risk Management, Business Continuity Planning, Asset Protection, Risk Analysis, Risk Management Framework, Security Strategy, Cyber Governance, Risk Mitigation, Vendor Management, Business Continuity, Risk Control, Vulnerability Assessments, Security Management, Cyber Risk, Vendor Relationship Management, Compliance Management, Supplier Risk Management, Supplier Management

What brings you to Coursera today?

  • Skills you'll gain: Threat Detection, Endpoint Security, Hardening, Firewall, Cybersecurity, Network Security, Cyber Attacks, Cyber Security Strategy, Cyber Operations, Authorization (Computing), Security Controls, Network Monitoring, Data Security, Identity and Access Management

  • Skills you'll gain: Email Security, Public Key Infrastructure, Encryption, Cryptography, IT Security Architecture, Network Security, Cybersecurity, Hardening, Endpoint Detection and Response, Data Security, Cryptographic Protocols, Network Architecture, Advanced Encryption Standard (AES), Key Management, Authorization (Computing), Cyber Attacks, Information Technology, Cyber Security Strategy, Penetration Testing, Computer Security Incident Management

  • Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Security Testing, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Vulnerability Scanning, Operating Systems, Cyber Risk, Cloud Services, Exploitation techniques, General Networking, Cyber Governance, Cyber Security Strategy

  • Skills you'll gain: Digital Forensics, Penetration Testing, Network Security, Threat Management, Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Security Testing, Cryptography, Security Controls, Cryptographic Protocols, Cyber Security Assessment, Cybersecurity, Authorization (Computing), Cloud Computing, Malware Protection, Cyber Attacks, Data Integrity

  • Cisco Learning and Certifications

    Skills you'll gain: MITRE ATT&CK Framework, Incident Response, Cyber Threat Intelligence, Cyber Threat Hunting, Key Management, Data Security, Malware Protection, Network Security, Threat Modeling, Computer Security Incident Management, File Systems, Threat Detection, Endpoint Security, Cryptography, Linux, Operating System Administration, Vulnerability Assessments, Cybersecurity, Cyber Operations, Security Information and Event Management (SIEM)

  • Skills you'll gain: AI Security, MITRE ATT&CK Framework, Penetration Testing, Incident Response, Cyber Threat Hunting, Cybersecurity, Cyber Threat Intelligence, DevSecOps, Digital Forensics, Cloud Security, Patch Management, Cyber Security Assessment, Exploitation techniques, Network Security, Computer Security Incident Management, Disaster Recovery, Cryptography, Incident Management, Responsible AI, DevOps